This article describes how to configure the Impersonation Protect definition.
We provide a list of Impersonation Protect definitions and policy settings based on commonly used configurations that provide an optimal solution to protect you against targeted spear phishing attacks.
To configure an Impersonation Protect definition:
- Log in to the Mimecast Administration Console.
- Navigate to Policies | Gateway Policies.
- Click on the Definitions button.
- Select the Impersonation Protection option.
- Either click on the:
-
-
- New Definition button to create a definition.
-
or
- Definition to be changed.
-
- Complete the Identifier Settings dialog section.
| Field / Option | Description |
|---|---|
| Description | Describe the definition to help you identify it. This is appended to emails in the archive that have this definition applied. |
| Similar Internal Domain |
If selected, the similarity distance of the sender's domain is checked against your internal domains. For example, if the sender's domain is minecast.com, and you have the mimecast.com internal domain, it's a similarity distance of 1 because one character is different. Mimecast automatically calculates the optimal similarity distance length to use specifically for the internal domains in your account. This allows using various character distances depending on the number of characters in your internal domains.
An additional Similar Internal Domain check will be performed to ensure that the domain is on a Mimecast Safe Category List, and if so, we will not match it against the Similar Internal Domain check.
For protection against exact spoofing of your internal domain, ensure an Anti-Spoofing Policy is enabled on your account. |
| Check Monitored External Domains | If selected, the sender's domain is checked against your external domains according to the options below, at least one of which must be selected:
|
| Newly Observed Domain (Does not mean newly registered domains) |
If selected, the sender's domain is checked against a list of domains we maintain to see if there's been an increase in it sending messages in the last week. This includes domains created at any time (e.g., those created but previously dormant). Additionally, we don't see all email traffic, so the list may not contain every potential threat. |
| Display Name | The All Internal User Names and Custom User Names fields are displayed if selected. These allow you to control how a sender's display name is checked for a potential impersonation attack.
|
| Internal User Name | If selected, the sender's display name (e.g., their first and last name) is checked to see if it matches one of your internal user display names. This ensures any threats that spoof an internal user are detected. We normalize names to account for user display name variations (e.g., "<firstname> <initial> <lastname>," "<lastname> <first name>").
A few exceptions exist that would prevent Impersonation Protection from applying to an Inbound message, which are as follows:
|
| Custom Display Names | Use this field to add nicknames for users that may otherwise get missed by the All Internal User Names option. For example, if the recipient's display name is Andrew Smith, enter Andy Smith and Andi Smith. This matches Andrew to Andy and Andi. It also allows scoping of names to check against (e.g., not wanting to match on all internal sender names). If you do not want to check for all names, use this option to check for a subset. When entering nicknames:
|
| Reply-to Address Mismatch |
If selected, a check is made to identify if a mismatch has occurred between the sender’s email address (both Header and Envelope), and the Reply-to email address.
Message can contain links that respond to a different email address than the one who sent the message (e.g., newsletters). If so, you may need to configure a Configuring an Impersonation Protect Bypass Policy. |
| Targeted Threat Dictionary | If selected, the message content is checked against a Targeted Threat Dictionary according to one or both of the options below:
|
| Number of Hits | Specify how many of the above identifiers have to match for an inbound mail to invoke an action. All checks are conducted on the Envelope AND Header From addresses by default.
It's recommended that at least two identifiers are detected before taking any action. |
| Enable Advanced Similar Domain Checks | If selected, checks are made for attacks where the sender's domain is similar to your internal or monitored external domains. For example, using special characters to look like other characters. You must have selected one of the following definition options for this feature to work:
|
| Ignore Signed Messages | If selected, checks aren't performed on digitally signed messages. This ensures the message's signature remains intact. |
| Bypass Permitted Senders |
This option bypasses the sender checks listed/contained in the managed sender/permitted sender policy. For more details, see the Configuring Permitted Senders Policies. Note: Auto Allow entries are not considered for this. |
- Specify the Identifier Actions to take when the Number of Hits threshold has been reached
| Field / Option | Description | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Action | Specify the required action to be taken if the value specified in the "Number of Hits" option is met:
|
|||||||||||||||||||||||||||||||||||||||
| Hold Type | Select whether to restrict the view of held messages in Mimecast end-user applications. The default value is User, but you can restrict them only to be viewed by a Moderator or Administrator.
If Moderator is selected, held messages are still listed in the user's Digest Email. |
|||||||||||||||||||||||||||||||||||||||
| Moderator Group | Click on the Lookup button to select a group of users to moderate the specified action. | |||||||||||||||||||||||||||||||||||||||
| Tag Message Body | If selected, a text box is displayed that allows you to specify a message (up to 500 characters) added to the message's body. The text box displays as plain text by default. If required, HTML can be specified to customize the text's look and feel. The following variables can be used when customizing the text appended to the message body:
If no customized text is specified, the following default text is used: If we cannot tag a message's body (e.g., due to the message's structure), the subject is tagged instead. |
|||||||||||||||||||||||||||||||||||||||
| Tag Subject | If selected, a text box is displayed that allows you to specify a message (up to 100 characters) added to the message's subject. The text box displays as plain text by default. If required, HTML can be specified instead to customize the text's look and feel. If no text is specified, the following default text is used: |
|||||||||||||||||||||||||||||||||||||||
| Tag Header | If selected, the following message is added to the email's header: To provide extra flexibility for administrators, if header tagging is enabled, Impersonation Protection stamps all inbound headers regardless of whether the Number of Hits threshold has been reached. However, the 'Suspicious' tagging will be removed if the Number of Hits is unmet. |
- Complete the General Actions as required
| Field / Option | Description |
|---|---|
| Mark All Inbound Items as 'External' |
If selected, the following tagging options are available:
|
- Complete the Notifications section as required
| Field / Option | Description |
|---|---|
| Notify Group | Use the Lookup button to select a group of users. They will be notified when the definition is triggered and why. |
| Notify (Internal) Recipient | If selected, a notification is sent to the recipient of the message that triggered this definition. This applies to inbound messages only. |
| Notify Overseers | If selected, a notification is sent to the members of the Oversight Group when there is a Content Overseers policy active for the communication pair of the message, and the message triggered this definition. |
- Click on the Save and Exit button
Comments
Please sign in to leave a comment.